Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

Get registered for a live TechRepublic Webcast on April 22 that will answer your questions about simplifying network security and getting the most out of your resources to meet the latest security threats.

The Tibetan Government in Exile asked the Information Warfare Monitor consortium to investigate allegations of cyberspying. It appears they've found evidence of spying plus a whole lot more and that should concern all of us.

As information technologies become more efficient, and as we conceive of more effective ways of using them, the temptation to engage in data collection and analysis grows. Especially when that data relates to security, we should be careful about how we go about collecting it, and whether it is wise to collect it at all.

Two new bills have been introduced in the Senate. One would create a new cabinet-level position of national cyber security advisor. The second gives that person sweeping powers to control cyberspace. Sound like a good idea? You tell me.

The TSA's "behavior detection" techniques for finding terrorists fit in well with many of the rest of the TSA's policies, in that it provides an excellent example of security theater -- policies enacted more for show than for any real effect.

The tools we have available now for real-time communication provide efficiency and collaborative opportunities for business, but unregulated, they can also expose your company to danger. How can you protect your unified communications from misuse?

More than 100,000 hosts have been infected with a new worm called psyb0t. This worm appears to present a serious threat to home networks everywhere, if you believe the trade press reports. There may be reasons to disbelieve them in this case, though.

11 March 2009 became a significant day for many. It's when Google initiated what they call interest-based advertising, or behavioral targeting to the rest of us. If this concerns you, find out what you can do.

Security researchers Joanna Rutkowska and Rafal Wojtczuk just published a research paper describing a new SMM rootkit that installs via a CPU caching vulnerability. This could be the "perfect storm" of rootkits.

Still looking for an easy, affordable solution for encrypting USB storage? Working on a limited budge while trying to figure out how to force encryption of mobile data? Your problems may be over if you can wait for Windows 7.